Executive Proposal

1371 Words3 Pages

As threats evolve and change with each new technology introduced organizations will also have to strive to improve the techniques used to protect their critical Information Technology (IT) assets. Gartner's IT Key Metrics Data for 2010 which was based on a survey of companies worldwide found that a company spent 5% of their IT budget on IT Security (Kirk, 2010). Connie Guglielmo, a Forbes staff member noted that IT spending will hit $2 Trillion in 2013 and Worldwide IT spending will rise 4.6 percent this year (Guglielmo, 2013).

There is no doubt that some portion of the IT budget will be spent on a technology solution for the purpose of defending the IT infrastructure. The questions are what will it be spent on, what assets will be protected and will the solution be relevant to tomorrow’s emerging threats? There are new vulnerabilities and threats targeting IT systems on a daily bases, staying on top of system vulnerabilities can be a massive and daunting task. A combination of systems i.e. Windows, Linux, UNIX, Cisco, Juniper etc… complicates vulnerability management and if not properly managed will lead to critical IT assets and information being compromised and damage to an organizations’ reputation. Successfully identifying system vulnerabilities, also known as Vulnerability Management is paramount to system security; a reliable vulnerability scanner is the key to successful vulnerability management.

Vulnerability scanning security software can combat system based threats while maintaining compliance and securing critical IT assets. This paper will look at vulnerability scanning security and discuss what it is, its value to the organization, integration with the current IT infrastructure as well as vender vulnerabil...

... middle of paper ...

...ty scanning is and key aspects of its operations, how vulnerability scanning can be layered on the current IT infrastructure as part of the defense in-depth security model. Additionally, covered was vulnerability scanning strengths and weaknesses as well as its value to the organization. Vulnerability scanning venders were discussed with a close look at the Tenable Nessus family of vulnerability scanning solutions. This paper clearly outlined the need for vulnerability scanning solution to mitigate current threats and to place the organization in a position to combat future threats.

IX. Recommendation

The US-CERT reported for the week of September 23, 2013, there were over eighty new vulnerabilities identified across multiple operating systems and platforms (US-CERT, 2013).

I highly recommend a Tenable Nessus vulnerability scanning solution be implemented.

More about Executive Proposal

Open Document